The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eran Tromer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer
    Analysis of Bernstein's Factorization Circuit. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:1-26 [Conf]
  2. Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul C. Leyland
    Factoring Estimates for a 1024-Bit RSA Modulus. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:55-74 [Conf]
  3. Boaz Barak, Ronen Shaltiel, Eran Tromer
    True Random Number Generators Secure in a Changing Environment. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:166-180 [Conf]
  4. Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer
    Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:131-146 [Conf]
  5. Adi Shamir, Eran Tromer
    Factoring Large Number with the TWIRL Device. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:1-26 [Conf]
  6. Dag Arne Osvik, Adi Shamir, Eran Tromer
    Cache Attacks and Countermeasures: The Case of AES. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:1-20 [Conf]
  7. Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer
    Improved Routing-Based Linear Algebra for the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:636-641 [Conf]
  8. Moni Naor, Asaf Nussboim, Eran Tromer
    Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:66-85 [Conf]

  9. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. [Citation Graph (, )][DBLP]


  10. Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. [Citation Graph (, )][DBLP]


  11. Path-quality monitoring in the presence of adversaries. [Citation Graph (, )][DBLP]


  12. Noninterference for a Practical DIFC-Based Operating System. [Citation Graph (, )][DBLP]


  13. Proof-Carrying Data and Hearsay Arguments from Signature Cards. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002